咨询与建议

限定检索结果

文献类型

  • 2,978 篇 会议
  • 1,650 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 4,676 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,896 篇 工学
    • 2,008 篇 计算机科学与技术...
    • 1,675 篇 软件工程
    • 485 篇 信息与通信工程
    • 465 篇 控制科学与工程
    • 302 篇 电气工程
    • 282 篇 生物工程
    • 223 篇 电子科学与技术(可...
    • 221 篇 机械工程
    • 192 篇 化学工程与技术
    • 190 篇 生物医学工程(可授...
    • 155 篇 光学工程
    • 125 篇 动力工程及工程热...
    • 123 篇 材料科学与工程(可...
    • 122 篇 安全科学与工程
    • 103 篇 仪器科学与技术
    • 102 篇 交通运输工程
    • 100 篇 土木工程
    • 93 篇 网络空间安全
  • 1,343 篇 理学
    • 637 篇 数学
    • 379 篇 物理学
    • 312 篇 生物学
    • 196 篇 统计学(可授理学、...
    • 179 篇 系统科学
    • 152 篇 化学
  • 856 篇 管理学
    • 606 篇 管理科学与工程(可...
    • 303 篇 图书情报与档案管...
    • 295 篇 工商管理
  • 180 篇 医学
    • 163 篇 临床医学
    • 129 篇 基础医学(可授医学...
  • 108 篇 经济学
    • 107 篇 应用经济学
  • 100 篇 法学
  • 76 篇 教育学
  • 46 篇 农学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 10 篇 文学

主题

  • 163 篇 software enginee...
  • 101 篇 software
  • 98 篇 deep learning
  • 92 篇 computational mo...
  • 87 篇 feature extracti...
  • 86 篇 machine learning
  • 83 篇 accuracy
  • 72 篇 computer science
  • 71 篇 computer archite...
  • 71 篇 training
  • 69 篇 data mining
  • 68 篇 software systems
  • 65 篇 semantics
  • 65 篇 data models
  • 61 篇 cloud computing
  • 60 篇 artificial intel...
  • 57 篇 systems engineer...
  • 55 篇 optimization
  • 55 篇 predictive model...
  • 52 篇 security

机构

  • 77 篇 beijing engineer...
  • 58 篇 state key labora...
  • 55 篇 school of softwa...
  • 46 篇 college of compu...
  • 45 篇 shenzhen institu...
  • 33 篇 university of ch...
  • 31 篇 school of softwa...
  • 31 篇 beijing key labo...
  • 29 篇 suzhou institute...
  • 29 篇 school of inform...
  • 26 篇 college of compu...
  • 23 篇 school of softwa...
  • 22 篇 school of comput...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 key laboratory o...
  • 21 篇 state key labora...
  • 21 篇 state key labora...
  • 19 篇 college of compu...

作者

  • 35 篇 biffl stefan
  • 33 篇 junping du
  • 29 篇 zhangqin huang
  • 26 篇 stefan biffl
  • 26 篇 rausch andreas
  • 20 篇 john grundy
  • 20 篇 ismail leila
  • 19 篇 baojian hua
  • 18 篇 moser thomas
  • 17 篇 andreas rausch
  • 17 篇 yingmin jia
  • 16 篇 wang wei
  • 16 篇 grundy john
  • 15 篇 hua baojian
  • 15 篇 huang zhangqin
  • 14 篇 veera boonjing
  • 13 篇 zhang qiang
  • 13 篇 thomas moser
  • 13 篇 xinjun mao
  • 13 篇 lin lin

语言

  • 4,051 篇 英文
  • 586 篇 其他
  • 47 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Systems Engineering Advanced Software and Technology"
4676 条 记 录,以下是261-270 订阅
Neural-Network-Based Control for Discrete-Time Nonlinear systems with Input Saturation Under Stochastic Communication Protocol
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第4期8卷 766-778页
作者: Xueli Wang Derui Ding Hongli Dong Xian-Ming Zhang Department of Control Science and Engineering University of Shanghai for Science and TechnologyShanghai 200093China School of Software and Electrical Engineering Swinburne University of TechnologyMelbourne 3122VictoriaAustralia Institute of Complex Systems and Advanced Control Northeast Petroleum UniversityDaqing 163318China
In this paper,an adaptive dynamic programming(ADP)strategy is investigated for discrete-time nonlinear systems with unknown nonlinear dynamics subject to input *** save the communication resources between the controll... 详细信息
来源: 评论
Improving Fake News Detection with a Mixture of Experts: Leveraging Sentiment Analysis and Sarcasm Detection as Core Expert Models  6
Improving Fake News Detection with a Mixture of Experts: Lev...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Gunasekara, Tharindu Thihan, Disira Kodithuwakku, Sansika Dissanayake, Dinuka Fernando, Harinda Vidhanaarachchi, Samitha Sindhujan, Archchana Sri Lanka Institute of Information Technology Malabe Dept. of Software Engineering Sri Lanka Sri Lanka Institute of Information Technology Malabe Dept. of Computer Computer Systems Engineering Sri Lanka University of Surrey Dept. of Computer Science and Electronic Engineering United Kingdom
Fake news continues to proliferate, posing an increasing threat to public discourse. The paper proposes a framework of a Mixture of Experts, Sentiment Analysis, and Sarcasm Detection experts for improved fake news det... 详细信息
来源: 评论
Quantum Computing's Impact on Data Encryption:Methodologies, Implementation, and Future Directions: Exploring the BB84 Protocol and Comparative Analysis with Classical Cryptographic Techniques  2
Quantum Computing's Impact on Data Encryption:Methodologies,...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Kamel, Omar H.Ali El-Din Raslan, Atef Tayh Nour Aly, Tarek Gheith, Mervat Cairo University Faculty of Graduate Studies For Statistical Research Cairo Egypt Higher Institute of Advanced Studies Department of Information Systems Cairo Egypt Cairo University Faculty of Graduate Studies for Statistical Research Software Engineering Department Cairo Egypt
This paper delves into the realm of quantum computing and its potential to revolutionize data encryption methodologies. Leveraging IBM's Qiskit tool, we investigate encryption approaches aimed at bolstering data s... 详细信息
来源: 评论
Global Stock Market Prediction Using Transformer-Based Deep Learning Techniques  15
Global Stock Market Prediction Using Transformer-Based Deep ...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Gothai, E. Thamilselvan, R. Natesan, P. Vignesh, K. Kongu Engineering College Department of Computer Technology Tamilnadu Perundurai India Kongu Engineering College Department of Cse Tamilnadu Perundurai India Kongu Engineering College Department of It Tamilnadu Perundurai India Kongu Engineering College Software Systems Department of Ct Tamilnadu Perundurai India
Deep learning approaches' use in financial market forecasting has recently drawn a lot of attention from both investors and scholars. The Transformer framework, initially created for natural language processing, i... 详细信息
来源: 评论
Evaluating the usage of fault localization in automated program repair:an empirical study
收藏 引用
Frontiers of Computer Science 2021年 第1期15卷 53-67页
作者: Deheng YANG Yuhua QI Xiaoguang MAO Yan LEI College of Computer National University of Defense TechnologyChangsha 410073China Laboratory of Software Engineering for Complex Systems Changsha 410073China Beijing Institute of Tracking and Communication Technology Beijing 100094China School of Big Data&Software Engineering Chongqing UniversityChongqing 400044China
Fault localization techniques are originally proposed to assist in manual debugging by generally producing a rank list of suspicious *** the increasing popularity of automated program repair,the fault localization tec... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Designing Uncorrelated Address Constrain for DNA Storage by DMVO Algorithm
收藏 引用
IEEE/ACM Transactions on Computational Biology and Bioinformatics 2022年 第2期19卷 866-877页
作者: Cao, Ben Ii, Xue Zhang, Xiaokang Wang, Bin Zhang, Qiang Wei, Xiaopeng Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Ministry of Education School of Software Engineering Dalian University Dalian116622 China School of Computer Science and Technology Dalian University of Technology Dalian116024 China
At present, huge amounts of data are being produced every second, a situation that will gradually overwhelm current storage technology. DNA is a storage medium that features high storage density and long-term stabilit... 详细信息
来源: 评论
Sentiment Analysis of Covid-19 Twitter Data using Deep Learning Algorithm  2
Sentiment Analysis of Covid-19 Twitter Data using Deep Learn...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Valarmathi, B. Gupta, N. Srinivasa Karthick, V. Chellatamilan, T. Santhi, K. Chalicheemala, Dhanush Department of Software and Systems Engineering School of Information Technology and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Manufacturing School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Assistant Systems Engineer Tata Consultancy Services Chennai India Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Information Technology and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
A key method used in the study of Natural Language Processing (NLP) is sentiment analysis, or emotion analysis, plays a pivotal role in text analysis. Its primary function is to discern and categorize the underlying e... 详细信息
来源: 评论
Using transformers and Bi-LSTM with sentence embeddings for prediction of openness human personality trait
收藏 引用
PeerJ Computer Science 2025年 11卷 1-42页
作者: Naz, Anam Khan, Hikmat Ullah Alsahfi, Tariq Alhajlah, Mousa Alshemaimri, Bader Daud, Ali Department of Information Technology University of Sargodha Punjab Sargodha Pakistan Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Applied of Computer Science College King Saud University Riyadh Saudi Arabia Software Engineering Department College of Computing and Information Sciences King Saud University Riyadh Saudi Arabia Faculty of Resilience Rabdan Academy Abu Dhabi United Arab Emirates
Understanding human personality traits is significant as it helps in decision making related to consumers’ behavior, career counselling, team building and top candidates’ selection for recruitment. Among various tra... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论